/*
* Copyright (c) OSGi Alliance (2004, 2010). All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.osgi.service.application;
import java.security.Permission;
import java.util.Hashtable;
import java.util.StringTokenizer;
import java.util.Vector;
import org.osgi.framework.Filter;
import org.osgi.framework.FrameworkUtil;
import org.osgi.framework.InvalidSyntaxException;
This class implements permissions for manipulating applications and their
instances.
ApplicationAdminPermission can be targeted to applications that matches the
specified filter.
ApplicationAdminPermission may be granted for different actions: lifecycle
, schedule
and lock
. The permission schedule
implies the permission lifecycle
.
Version: $Id: 5fe9fdd7f70e6f506ef46fc19d55eecf59029687 $
/**
* This class implements permissions for manipulating applications and their
* instances.
* <P>
* ApplicationAdminPermission can be targeted to applications that matches the
* specified filter.
* <P>
* ApplicationAdminPermission may be granted for different actions:
* {@code lifecycle}, {@code schedule} and {@code lock}. The
* permission {@code schedule} implies the permission
* {@code lifecycle}.
*
* @version $Id: 5fe9fdd7f70e6f506ef46fc19d55eecf59029687 $
*/
public class ApplicationAdminPermission extends Permission {
private static final long serialVersionUID = 1L;
Allows the lifecycle management of the target applications.
/**
* Allows the lifecycle management of the target applications.
*/
public static final String LIFECYCLE_ACTION = "lifecycle";
Allows scheduling of the target applications. The permission to schedule an application implies that the scheduler can also manage the lifecycle of that application i.e. schedule
implies lifecycle
/**
* Allows scheduling of the target applications. The permission to
* schedule an application implies that the scheduler can also
* manage the lifecycle of that application i.e. {@code schedule}
* implies {@code lifecycle}
*/
public static final String SCHEDULE_ACTION = "schedule";
Allows setting/unsetting the locking state of the target applications.
/**
* Allows setting/unsetting the locking state of the target applications.
*/
public static final String LOCK_ACTION = "lock";
private ApplicationDescriptor applicationDescriptor;
Constructs an ApplicationAdminPermission. The filter
specifies the target application. The filter
is an LDAP-style filter, the recognized properties are signer
and pid
. The pattern specified in the signer
is matched with the Distinguished Name chain used to sign the application. Wildcards in a DN are not matched according to the filter string rules, but according to the rules defined for a DN chain. The attribute pid
is matched with the PID of the application according to the filter string rules. If the filter
is null
then it matches "*"
. If actions
is "*"
then it identifies all the possible actions.
Params: - filter – filter to identify application. The value
null
is equivalent to "*"
and it indicates "all application". - actions – comma-separated list of the desired actions granted on the applications or "*" means all the actions. It must not be
null
. The order of the actions in the list is not significant.
Throws: - InvalidSyntaxException – is thrown if the specified
filter
is not syntactically correct. - NullPointerException – is thrown if the actions parameter is
null
See Also: - ApplicationDescriptor
- AdminPermission
/**
* Constructs an ApplicationAdminPermission. The {@code filter}
* specifies the target application. The {@code filter} is an
* LDAP-style filter, the recognized properties are {@code signer}
* and {@code pid}. The pattern specified in the {@code signer}
* is matched with the Distinguished Name chain used to sign the application.
* Wildcards in a DN are not matched according to the filter string rules,
* but according to the rules defined for a DN chain. The attribute
* {@code pid} is matched with the PID of the application according to
* the filter string rules.
* <p>
* If the {@code filter} is {@code null} then it matches
* {@code "*"}. If
* {@code actions} is {@code "*"} then it identifies all the
* possible actions.
*
* @param filter
* filter to identify application. The value {@code null}
* is equivalent to {@code "*"} and it indicates "all application".
* @param actions
* comma-separated list of the desired actions granted on the
* applications or "*" means all the actions. It must not be
* {@code null}. The order of the actions in the list is
* not significant.
* @throws InvalidSyntaxException
* is thrown if the specified {@code filter} is not syntactically
* correct.
*
* @exception NullPointerException
* is thrown if the actions parameter is {@code null}
*
* @see ApplicationDescriptor
* @see org.osgi.framework.AdminPermission
*/
public ApplicationAdminPermission(String filter, String actions) throws InvalidSyntaxException {
super(filter == null ? "*" : filter);
if( filter == null )
filter = "*";
if( actions == null )
throw new NullPointerException( "Action string cannot be null!" );
this.applicationDescriptor = null;
this.filter = (filter == null ? "*" : filter);
this.actions = actions;
if( !filter.equals( "*" ) && !filter.equals( "<<SELF>>" ) )
FrameworkUtil.createFilter( this.filter ); // check if the filter is valid
init();
}
This contructor should be used when creating ApplicationAdminPermission
instance for checkPermission
call. Params: - application – the tareget of the operation, it must not be
null
- actions – the required operation. it must not be
null
Throws: - NullPointerException – if any of the arguments is null.
/**
* This contructor should be used when creating {@code ApplicationAdminPermission}
* instance for {@code checkPermission} call.
* @param application the tareget of the operation, it must not be {@code null}
* @param actions the required operation. it must not be {@code null}
* @throws NullPointerException if any of the arguments is null.
*/
public ApplicationAdminPermission(ApplicationDescriptor application, String actions) {
super(application.getApplicationId());
if( application == null || actions == null )
throw new NullPointerException( "ApplicationDescriptor and action string cannot be null!" );
this.filter = application.getApplicationId();
this.applicationDescriptor = application;
this.actions = actions;
init();
}
This method can be used in the ProtectionDomain
implementation in the implies
method to insert the application ID of the current application into the permission being checked. This enables the evaluation of the <<SELF>>
pseudo targets. Params: - applicationId – the ID of the current application.
Returns: the permission updated with the ID of the current application
/**
* This method can be used in the {@link java.security.ProtectionDomain}
* implementation in the {@code implies} method to insert the
* application ID of the current application into the permission being
* checked. This enables the evaluation of the
* {@code <<SELF>>} pseudo targets.
* @param applicationId the ID of the current application.
* @return the permission updated with the ID of the current application
*/
public ApplicationAdminPermission setCurrentApplicationId(String applicationId) {
ApplicationAdminPermission newPerm = null;
if( this.applicationDescriptor == null ) {
try {
newPerm = new ApplicationAdminPermission( this.filter, this.actions );
}catch( InvalidSyntaxException e ) {
throw new RuntimeException(e); /* this can never happen */
}
}
else
newPerm = new ApplicationAdminPermission( this.applicationDescriptor, this.actions );
newPerm.applicationID = applicationId;
return newPerm;
}
Checks if the specified permission
is implied by this permission. The method returns true under the following conditions:
- This permission was created by specifying a filter (see
ApplicationAdminPermission(String, String)
) - The implied
otherPermission
was created for a particular ApplicationDescriptor
(see ApplicationAdminPermission(ApplicationDescriptor, String)
) - The
filter
of this permission mathes the ApplicationDescriptor
specified in the otherPermission
. If the filter in this permission is the <<SELF>>
pseudo target, then the currentApplicationId set in the otherPermission
is compared to the application Id of the target ApplicationDescriptor
. - The list of permitted actions in this permission contains all actions required in the
otherPermission
Otherwise the method returns false.
Params: - otherPermission – the implied permission
Returns: true if this permission implies the otherPermission
, false otherwise.
/**
* Checks if the specified {@code permission} is implied by this permission.
* The method returns true under the following conditions:
* <UL>
* <LI> This permission was created by specifying a filter (see {@link #ApplicationAdminPermission(String, String)})
* <LI> The implied {@code otherPermission} was created for a particular {@link ApplicationDescriptor}
* (see {@link #ApplicationAdminPermission(ApplicationDescriptor, String)})
* <LI> The {@code filter} of this permission mathes the {@code ApplicationDescriptor} specified
* in the {@code otherPermission}. If the filter in this permission is the
* {@code <<SELF>>} pseudo target, then the currentApplicationId set in the
* {@code otherPermission} is compared to the application Id of the target
* {@code ApplicationDescriptor}.
* <LI> The list of permitted actions in this permission contains all actions required in the
* {@code otherPermission}
* </UL>
* Otherwise the method returns false.
* @param otherPermission the implied permission
* @return true if this permission implies the {@code otherPermission}, false otherwise.
*/
@Override
public boolean implies(Permission otherPermission) {
if( otherPermission == null )
return false;
if(!(otherPermission instanceof ApplicationAdminPermission))
return false;
ApplicationAdminPermission other = (ApplicationAdminPermission) otherPermission;
if( !filter.equals("*") ) {
if( other.applicationDescriptor == null )
return false;
if( filter.equals( "<<SELF>>") ) {
if( other.applicationID == null )
return false; /* it cannot be, this might be a bug */
if( !other.applicationID.equals( other.applicationDescriptor.getApplicationId() ) )
return false;
}
else {
Hashtable props = new Hashtable();
props.put( "pid", other.applicationDescriptor.getApplicationId() );
props.put( "signer", new SignerWrapper( other.applicationDescriptor ) );
Filter flt = getFilter();
if( flt == null )
return false;
if( !flt.match( props ) )
return false;
}
}
if( !actionsVector.containsAll( other.actionsVector ) )
return false;
return true;
}
@Override
public boolean equals(Object with) {
if( with == null || !(with instanceof ApplicationAdminPermission) )
return false;
ApplicationAdminPermission other = (ApplicationAdminPermission)with;
// Compare actions:
if( other.actionsVector.size() != actionsVector.size() )
return false;
for( int i=0; i != actionsVector.size(); i++ )
if( !other.actionsVector.contains( actionsVector.get( i ) ) )
return false;
return equal(this.filter, other.filter ) && equal(this.applicationDescriptor, other.applicationDescriptor)
&& equal(this.applicationID, other.applicationID);
}
Compares parameters for equality. If both object are null, they are considered
equal.
Params: - a – object to compare
- b – other object to compare
Returns: true if both objects are equal or both are null
/**
* Compares parameters for equality. If both object are null, they are considered
* equal.
* @param a object to compare
* @param b other object to compare
* @return true if both objects are equal or both are null
*/
private static boolean equal(Object a, Object b) {
// This equation is true if both references are null or both point
// to the same object. In both cases they are considered as equal.
if( a == b ) {
return true;
}
return a.equals(b);
}
@Override
public int hashCode() {
int hc = 0;
for( int i=0; i != actionsVector.size(); i++ )
hc ^= ((String)actionsVector.get( i )).hashCode();
hc ^= (null == this.filter )? 0 : this.filter.hashCode();
hc ^= (null == this.applicationDescriptor) ? 0 : this.applicationDescriptor.hashCode();
hc ^= (null == this.applicationID) ? 0 : this.applicationID.hashCode();
return hc;
}
Returns the actions of this permission.
Returns: the actions specified when this permission was created
/**
* Returns the actions of this permission.
* @return the actions specified when this permission was created
*/
@Override
public String getActions() {
return actions;
}
private String applicationID;
private static final Vector ACTIONS = new Vector();
private Vector actionsVector;
private final String filter;
private final String actions;
private Filter appliedFilter = null;
static {
ACTIONS.add(LIFECYCLE_ACTION);
ACTIONS.add(SCHEDULE_ACTION);
ACTIONS.add(LOCK_ACTION);
}
private static Vector actionsVector(String actions) {
Vector v = new Vector();
StringTokenizer t = new StringTokenizer(actions.toUpperCase(), ",");
while (t.hasMoreTokens()) {
String action = t.nextToken().trim();
v.add(action.toLowerCase());
}
if( v.contains( SCHEDULE_ACTION ) && !v.contains( LIFECYCLE_ACTION ) )
v.add( LIFECYCLE_ACTION );
return v;
}
private static class SignerWrapper extends Object {
private String pattern;
private ApplicationDescriptor appDesc;
Params: - pattern –
/**
* @param pattern
*/
public SignerWrapper(String pattern) {
this.pattern = pattern;
}
SignerWrapper(ApplicationDescriptor appDesc) {
this.appDesc = appDesc;
}
@Override
public boolean equals(Object o) {
if (!(o instanceof SignerWrapper))
return false;
SignerWrapper other = (SignerWrapper) o;
ApplicationDescriptor matchAppDesc = (ApplicationDescriptor) (appDesc != null ? appDesc : other.appDesc);
String matchPattern = appDesc != null ? other.pattern : pattern;
return matchAppDesc.matchDNChain(matchPattern);
}
}
private void init() {
actionsVector = actionsVector( actions );
if ( actions.equals("*") )
actionsVector = actionsVector( LIFECYCLE_ACTION + "," + SCHEDULE_ACTION + "," + LOCK_ACTION );
else if (!ACTIONS.containsAll(actionsVector))
throw new IllegalArgumentException("Illegal action!");
applicationID = null;
}
private Filter getFilter() {
if (appliedFilter == null) {
try {
appliedFilter = FrameworkUtil.createFilter(filter);
} catch (InvalidSyntaxException e) {
//we will return null
}
}
return appliedFilter;
}
}